Security of medical images for telemedicine: a systematic review

M Magdy, KM Hosny, NI Ghali, S Ghoniemy - Multimedia Tools and …, 2022 - Springer
Recently, there has been a rapid growth in the utilization of medical images in telemedicine
applications. The authors in this paper presented a detailed discussion of different types of …

SSII: secured and high-quality steganography using intelligent hybrid optimization algorithms for IoT

S Dhawan, C Chakraborty, J Frnda, R Gupta… - IEEE …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) is a domain where the transfer of big data is taking place every single
second. The security of these data is a challenging task; however, security challenges can …

Cloud and edge computing-based computer forensics: Challenges and open problems

V Prakash, A Williams, L Garg, C Savaglio, S Bawa - Electronics, 2021 - mdpi.com
In recent years, there has been a dramatic change in attitude towards computers and the
use of computer resources in general. Cloud and Edge computing have emerged as the …

Multiple zero-watermarking of medical images for internet of medical things

M Magdy, NI Ghali, S Ghoniemy, KM Hosny - IEEE Access, 2022 - ieeexplore.ieee.org
The Internet of Medical Things (IoMT) plays a vital role in healthcare systems to increase
electronic devices' accuracy, reliability, and productivity. This paper presents fast multiple …

An efficient and secure technique for image steganography using a hash function

ZI Nezami, H Ali, M Asif, H Aljuaid, I Hamid… - PeerJ Computer …, 2022 - peerj.com
Steganography is a technique in which a person hides information in digital media. The
message sent by this technique is so secret that other people cannot even imagine the …

A Huffman code LSB based image steganography technique using multi-level encryption and achromatic component of an image

S Rahman, J Uddin, H Hussain, A Ahmed, AA Khan… - Scientific Reports, 2023 - nature.com
In the recent couple of years, due to the accelerated popularity of the internet, various
organizations such as government offices, military, private companies, etc. use different …

A comparative analysis of arabic text steganography

R Thabit, NI Udzir, SM Yasin, A Asmawi, NA Roslan… - Applied Sciences, 2021 - mdpi.com
Protecting sensitive information transmitted via public channels is a significant issue faced
by governments, militaries, organizations, and individuals. Steganography protects the …

An efficient steganography technique based on S2OA & DESAE model

S Dhawan, R Gupta, HK Bhuyan… - Multimedia Tools and …, 2023 - Springer
This paper gives a novel and efficient steganography technique based on hybrid algorithms
that improves the various important parameters like PSNR, MSE, IF, capacity, security. It …

Various swarm optimization algorithms: Review, challenges, and opportunities

S Dhawan, R Gupta, A Rana, S Sharma - Soft Computing for Intelligent …, 2021 - Springer
In various research areas there is a requirement for optimized results in various research-
oriented parameters. In steganography, the important task is to find out the areas, where we …

Robust image watermarking in spatial domain utilizing features equivalent to svd transform

M Ali - Applied Sciences, 2023 - mdpi.com
In recent years, digital image watermarking has gained a significant amount of popularity
and developed into a crucial and essential tool for copyright protection, security, and the …